Skip to main content

CVE-2022-43249: n/a in n/a

Medium
VulnerabilityCVE-2022-43249cvecve-2022-43249
Published: Wed Nov 02 2022 (11/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_hv_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.

AI-Powered Analysis

AILast updated: 06/26/2025, 04:16:09 UTC

Technical Analysis

CVE-2022-43249 is a heap-buffer-overflow vulnerability identified in libde265 version 1.0.8, specifically within the function put_epel_hv_fallback<unsigned short> located in the fallback-motion.cc source file. Libde265 is an open-source H.265/HEVC video decoder library used for decoding video streams encoded with the HEVC standard. The vulnerability arises due to improper bounds checking when handling crafted video data, leading to a heap buffer overflow condition. This flaw can be triggered by processing a specially crafted video file, which causes the application using libde265 to overwrite memory beyond the allocated heap buffer. The consequence of this overflow is a Denial of Service (DoS) condition, typically resulting in a crash or abnormal termination of the application. According to the CVSS v3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H), the vulnerability can be exploited remotely over a network without privileges but requires user interaction (such as opening or streaming a malicious video file). The impact is limited to availability disruption, with no direct confidentiality or integrity compromise. No known exploits have been reported in the wild, and no official patches or vendor information are currently available. The vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating a memory safety issue that can lead to application instability or crashes. Given libde265’s role in video decoding, applications such as media players, streaming services, or any software leveraging this library for HEVC content playback are potentially affected if they use the vulnerable version.

Potential Impact

For European organizations, the primary impact of CVE-2022-43249 is service disruption due to application crashes when processing maliciously crafted HEVC video files. This can affect media companies, broadcasters, content delivery networks, and any enterprise relying on video playback or streaming services that incorporate libde265 v1.0.8. The DoS condition could be exploited to interrupt business operations, degrade user experience, or cause temporary outages in multimedia platforms. Although the vulnerability does not allow data theft or code execution, the availability impact can be significant in environments where video processing is critical, such as digital signage, video conferencing, or surveillance systems. Additionally, since exploitation requires user interaction, phishing or social engineering campaigns could be used to deliver malicious video files to targeted users. The absence of known exploits reduces immediate risk, but the medium severity rating and ease of remote exploitation warrant proactive mitigation. Organizations in sectors with high reliance on multimedia content or those exposed to external user inputs (e.g., public-facing media portals) are at higher risk of impact.

Mitigation Recommendations

1. Inventory and Identify: Conduct a thorough audit to identify all applications and systems using libde265, especially version 1.0.8. 2. Update or Patch: Monitor for official patches or updated versions of libde265 that address CVE-2022-43249 and apply them promptly once available. 3. Input Validation and Filtering: Implement strict validation and filtering of video files before processing, especially from untrusted sources. Employ sandboxing or isolated environments to handle video decoding to contain potential crashes. 4. User Awareness: Educate users about the risks of opening unsolicited or suspicious video files, particularly those received via email or messaging platforms. 5. Application Hardening: Where possible, configure applications to limit resource usage and implement crash recovery mechanisms to minimize downtime. 6. Network Controls: Use network security controls to restrict or monitor the transfer of video files from untrusted external sources. 7. Incident Response Preparedness: Develop and test incident response plans to quickly address service disruptions caused by video processing failures. These measures go beyond generic advice by focusing on the specific context of video decoding and the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb8cc

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:16:09 AM

Last updated: 8/15/2025, 6:46:28 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats